• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
What is identified as a weapon system due to its capabilities and our reliance on it for all air, space, and cyberspace operations?
Air Force Information Network (AFIN)
What is functional in nature and defined as system software used to perform basic functions in direct support of a stand-alone computer or network?

Utilities

What is used to locate and identify a network host to confirm connectivity?

Ping

What queries domain name service (DNS) data?

Nslookup

What is a diagnostic tool for displaying the path and measuring transit delays of packets across an Internet Protocol (IP) network?

Traceroute

What displays all of the current TCP/IP network configuration values?

Ipconfig
What is the point for joint air warfare command and control and is also the primary system for planning, managing, and executing the air battle?
Theater Battle Management Core System (TBMCS)
What are the two subsystems of TBMCS-UL?


TBMCS-UL Intel


TBMCS-UL Ops

What is in the middle of the TBMCS Logical Structure and feeds TBMCS with solid intelligence for Joint Headquarters and AOCs to make better and more precise decisions?

TBMCS-UL Intel
What is in the middle and bottom of the TBMCS Logical Structure and provides Wing Level decision support tools, resource management, an aircraft scheduling application, ATO parser, secure messages, document libraries, wing reporting tools, a situation room, and is the last stop for the execution of the ATO and Order of Battle?

TBMCS-UL Ops
What is at the top of the TBMCS Logical Structure and includes "big picture" elements such as bases, areas of responsibility (AOR), and the total mission?

TBMCS Force-Level (FL)
What is the premier system for the command and control of joint and coalition forces, as well as identifying the resources of our adversaries?
Global Command and Control System (GCCS)
What are the two main components of GCCS which provide unique capabilities to commanders?


Common Operational Picture (COP)


Integrated Imagery and Intelligence (I3)

What works with GCCS to allow commanders to be constantly aware of where their troops and valuable assets are on the battlefield?

Blue Force Tracker (BFT)
What is a special set of processes which support the Air Force planning and execution community in deliberate planning, crisis planning, and crisis execution?

Deliberate and Crisis Action Planning Execution Segment (DCAPES)

What provides the joint warfighter with the ability to identify, validate, and source force requirements, and requests the time phased movement of forces to the theater of interest?

Joint Operation Planning Execution System (JOPES)
What provides a comprehensive solution for change and configuration management for the Microsoft platform?

Microsoft Systems Center Configuration Manager
What are the 5 sections available for the Configuration Manager 2007 console?


Site Management


Computer Management


System Status


Security Rights


Tools


This section of Configuration Management contains options pertaining to the overall site, such as configuring site systems and roles?

Site Management
This section of Configuration Management contains options regarding client settings and features?

Computer Management

This section of Configuration Management contains options for monitoring the health of a site?
System Status
This section of Configuration Management allows you to configure the security based on users or groups that you define within Active Directory?
Security Rights
This section of Configuration Management allows you to control Configuration Management 2007 components throughout the entire hierarchy?

Tools

What provides the NCC environments with an integrated and common approach to trouble ticketing managed by a graphical user interface (GUI)?

Remedy
Good Mobile, Blackberry, Android, iOS, and Windows Mobile are examples of what?

Mobile Technologies

What is the NCC's primary engineering solution for the overall fault management functional area, and uses its knowledge of the topology, coupled with a mathematical algorithm, to identify the real cause of the problem?

SMARTS Incharge
What is a LAN management solution (LMS) that simplifies the administration, configuration, monitoring, and troubleshooting of Cisco-based networks?

CiscoWorks
What is a comprehensive solution for managing, diagnosing, and analyzing performance, availability, and server health for a broad, spectrum of operating environments, applications, and server hardware?

NetIQ AppManager Suite (AppManager)
Similar to LMSs, this is another AFIN-approved LMS which provides a suite of tools to manage network resources and provide a unified view of fault, performance, availability, traffic, and configuration information?

SolarWinds
What architecture supports an electric collaboration and publishing vehicle for data on the NIPRNet and SIPRNet?

Microsoft SharePoint

What is used as a mass communication system on military bases worldwide and consists of servers centrally located at each of the MAJCOMs and is supported by the base Comm Squadron?

Installation Warning System (IWS)
What is the Enterprise conferencing service for the DoD and enables users to communicate and interact with large and small groups in real-time?

Defense Connect Online (DCO)
What type of computer security incident is when a macro-virus infects an application or a serious system vulnerability is discovered?

Compromise of Integrity
What type of computer security incident occurs when an attacker disables a system or a worm saturates network bandwidth?
Denial of Service (DoS)
What type of computer security incident occurs when data is destroyed by a virus?
Damage
What type of computer security incident occurs when an intruder penetrates system security?

Intrusion

What type of computer security incident occurs when data is changed to affect system performance?

Alterations
What is the Air Force Intrusion Detection suite which triggers on attack signatures and alerts crews via java real time alert interface?

ASIM/CIDDS
What collects information from a variety of system and network sources, analyzes the information stream for signs of misuse or intrusion, and reports the outcome of the detection process?

Intrusion Detection System (IDS)
What is software used to prevent, detect and remove malicious computer viruses?

Antivirus (AV) Software

What are two antivirus and anti-spyware solutions available for DoD use?

McAfee Virus Scan


Symantec Endpoint Protection


What are the 3 types of Remote Access?


Administrative Access


End-User Access


Limited (General) Access

This requires the most stringent security controls and users must use government-owned or controlled devices to perform these duties including troubleshooting, configuration changes, and reviewing any system or configuration of data, regardless of system type?
Administrative Access
This type of access requires medium security controls on the remote system and requires that users do not make any system configuration changes or view configuration information?
End-User Access
This type of access requires minimum security controls and users may use non-government-owned devices with Designated Approval Authority (DAA) approval for this type of access?
Limited (General) Access

What are the two general methods of Remote Access?

Remote Control


Remote Node

What type of Remote Access has the user use his endpoint to connect to a network-attached host computer located on the home organization's network?

Remote Control

What type of Remote Access connects to the network and becomes another node on the network?

Remote Node

The basic requirements for what include the identification and authentication of the endpoint device; identification and authentication of the end-user; and the inspection and remediation of the endpoint device to determine if it matches established entry criteria?

Network Access Control (NAC)

What type of architecture's most critical part is to create a centralized point of access and authentication close to the network edge?

Remote Access Architecture

What blocks unauthorized traffic from entering servers from the internet?

Application-level firewall

What is a periodic assessment of security stances of the network?

Vulnerability Management

What enforces security rules and regulations of information technology systems, including configuration of every remote endpoint device used by teleworks?

Policy Management

What provides dial-in capability for the remote access user and can be integrated with the VPN gateway or router?

Remote Access Server (RAS)

What is a secure network for an organization that transmits data through the public network?

VPN Gateway